Code fortification

Lately, I’ve been reading a lot about code fortification, and low-level debugging. Here are some of the most interesting links I’ve found. They’re all worth reading if you fancy harcore OS internals and such:

An In-Depth Look into the Win32 Portable Executable File Format
Peering Inside the PE: A Tour of the Win32 Portable Executable File Format
The Portable Executable Format on Windows
Writing a basic Windows debugger (Part I)
Writing a basic Windows debugger (Part II)
An Anti-Reverse Engineering Guide
Anti-Debugging Techniques
Introduction Into Windows Anti-Debugging
Understanding the IAT table
Imports and Intermodular Calls
Anti-unpacker tricks

This all brings me back to my youth coding in x86 assembly language.

Comments are closed.